Ghostscript is a set of software that provides a PostScript interpreter, aset of C procedures (the Ghostscript library, which implements the graphicscapabilities in the PostScript language) and an interpreter for PortableDocument Format (PDF) files.

It was discovered that the Red Hat Security Advisory RHSA-2009:0345 did notaddress all possible integer overflow flaws in Ghostscript's InternationalColor Consortium Format library (icclib). Using specially-crafted ICCprofiles, an attacker could create a malicious PostScript or PDF file withembedded images that could cause Ghostscript to crash or, potentially,execute arbitrary code when opened. (CVE-2009-0792)

A buffer overflow flaw and multiple missing boundary checks were found inGhostscript. An attacker could create a specially-crafted PostScript or PDFfile that could cause Ghostscript to crash or, potentially, executearbitrary code when opened. (CVE-2008-6679, CVE-2007-6725, CVE-2009-0196)

Red Hat would like to thank Alin Rad Pop of Secunia Research forresponsibly reporting the CVE-2009-0196 flaw.

Users of ghostscript are advised to upgrade to these updated packages,which contain backported patches to correct these issues.

4. Solution:

Before applying this update, make sure that all previously-releasederrata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to usethe Red Hat Network to apply this update are available athttp://kbase.redhat.com/faq/docs/DOC-11259